☆31Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerabilities
Users that are interested in Vulnerabilities are comparing it to the libraries listed below
Sorting:
- some ida script☆34Aug 18, 2021Updated 4 years ago
- ☆17Jan 11, 2023Updated 3 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- only for request cve☆18Apr 16, 2025Updated 11 months ago
- ☆16Dec 15, 2023Updated 2 years ago
- ☆13Sep 22, 2025Updated 5 months ago
- CTF&RealWorld challenges☆26Oct 18, 2019Updated 6 years ago
- PendingIntent exploit☆11Sep 26, 2023Updated 2 years ago
- See https://gitlab.com/pandasauce/qsee-ta-tool for an up-to-date version☆13May 18, 2018Updated 7 years ago
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- IDA Pro processor module for Altera Nios II Classic/Gen2 microprocessor architecture☆32Sep 26, 2023Updated 2 years ago
- a better basefinder☆12Aug 25, 2021Updated 4 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- ☆17Feb 3, 2023Updated 3 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 6 years ago
- ☆26Aug 16, 2023Updated 2 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- awesome iot exploit resource☆71Jul 15, 2024Updated last year
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Jun 20, 2017Updated 8 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- A firmware base address search tool.☆373Sep 27, 2020Updated 5 years ago
- a demo poc for CVE-2024-0015☆18Aug 14, 2024Updated last year
- VxWork☆29Dec 20, 2018Updated 7 years ago
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- Script to setup pwn environment with Docker☆48Jan 10, 2026Updated 2 months ago
- 2023年西湖论剑IoT-AWD赛题仓库☆20Apr 13, 2023Updated 2 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆37Feb 6, 2020Updated 6 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆96Jun 29, 2022Updated 3 years ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 10 months ago
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- Modified luadec version to decompile TP-Link Archer C7 LUA firmware.☆31Mar 3, 2020Updated 6 years ago
- Unicorn CPU emulator framework tutorial☆22Apr 5, 2021Updated 4 years ago
- xiaomi lua anti☆32Jul 8, 2020Updated 5 years ago
- This is a RCE bluetooth vulnerability on Android 8.0 and 9.0☆30May 23, 2023Updated 2 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆13Jul 26, 2021Updated 4 years ago